Your data is being held hostage by cyber criminals. What now?
It's any company's worst nightmare - an employee in the organisation unknowingly downloads an email attachment containing malware, and within minutes your system has been hijacked and all your data encrypted. To make matters worse, the perpetrators are demanding a...
Cybersecurity is a process not a destination
If we are to understand the most important theme of the recent cybersecurity month, which as always, is accompanied by a host of articles around trends and best practice, it's pertinent to start with an analogy about our personal homes. By Antony Russell, chief...
Cloud security is a shared responsibility
With an increasing number of organisations moving their infrastructure and services to the cloud, many are adopting multi-cloud strategies, meaning that a host of different cloud computing and storage services are used in one heterogenous architecture. By Gerhard...
Stolen credentials a flourishing underground market
When you think about your social media accounts - for example, your Facebook password - does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone. According to a...
What does the rise of edge computing mean for cybersecurity?
As the number of users and devices connected at the 'edge' of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee, chief...
Higher levels of cyber awareness needed to combat festive season cybercrime
Following years of pandemic-induced economic pressure, the South African economy is slowly showing signs of recovery. As the country heads into the festive season and the traditional peak shopping period, many consumers are returning to normal, pre-pandemic...
OT the new feeding ground for cyber-attacks
Before the advent of Industrial Internet of Things (IIoT), operation technology (OT) was safeguarded against most cyberattacks. OT systems' propriety nature, standards and hard-wired connectivity protected it against malicious attacks. By Johan Potgieter, cluster...
Vodacom Business partners with tech start-up
Vodacom Business has partnered with CybSafe to offer its clients and businesses on-demand access to security awareness and training. CybSafe is known for its customisable, behavioural-science based cybersecurity solutions. Now, Vodacom Business clients can download...
Banks move intruder systems to lithium battery technology
Banks have been challenged with load shedding to keep security systems operational and specifically intruder systems. As the level of load shedding intensified, lead acid batteries which were being used by most banks to run intruder systems, were showing a significant...
VMware Carbon Black XDR helps strengthen lateral security
VMware has launched VMware Carbon Black XDR, which extends VMware's network visibility and detection to VMware Carbon Black Enterprise EDR, significantly improving threat detection and prevention across endpoints and networks. The new XDR solution greatly enhances...
Cisco showcases security innovations
Cisco has announced new capabilities across its security portfolio so teams can be more productive and protected wherever they are working from. Unveiled at Cisco’s annual Partner Summit conference, the news demonstrates continued progress towards the strategic vision...
Turn your employees into human firewalls
Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a company can implement the best cyber-security technologies, the biggest threat to a firm remains its...